Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.

Social media policy

Originally Published:

Oct 2016

Every employee has an opportunity to express and communicate online in many ways, and the organization encourages an online presence. But above all else, they need to use good judgment on what material makes its way online. This policy sets forth guidelines employees should follow for all online communications in reference to this organization.

From the policy:

Responsibility
Any material presented online in reference to this company, by any associate, is the responsibility of the poster. We encourage all communication to be made with full, transparent, and accurate identification, if for no other reason than to establish honesty and credibility.

Along with clear identification, associates must state that any opinion is their own and not a form of official communication from this organization. Communication on social media in reference to this company shall not include any corporate logos or trademarks unless it is official and sanctioned by the company.

Topic matter guidelines
Associates are encouraged to use the following guidelines in social media interactions:

Be relevant to your area of expertise.

Do not be anonymous.

Maintain professionalism, honesty, and respect for other participants at all times.

Apply a “good judgment” test for every activity related to this organization: Could you be guilty of leaking information, trade secrets, customer data, or upcoming announcements? Is it negative commentary regarding the company?

Activity showing good judgment would include statements of fact about this organization and its products and services, facts about already-public information, or information previously published on the company website.

Associates should avoid responding to inflammatory and/or inaccurate comments posted on public forums concerning the organization, its products, or its business practices. Responding to such comments may lead to a heated exchange that can never be won. Particularly offensive and/or threatening comments should be referred to the Corporate Affairs Department or to Corporate Legal Counsel.

This policy describes measures for preventing workplace violence and outlines the steps your company and staff should take if violence does occur. The download includes a PDF version, along with a Wor...

This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees conne...

Organizations are using automation to streamline business processes, expedite product development and manufacturing, and free staff from low-level repetitive tasks. This ebook looks at how automation ...

This policy offers guidelines for responding to severe weather activity and other emergencies. The download includes both a PDF version and an RTF document to make customization easier.
The Severe We...

Responses to a 2016 Tech Pro Research survey indicate that AI and machine learning will be a significant area of development for IT in the next few years. Forty-two percent of respondents, most of who...

This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political af...

Sharing the same 2U chassis as the R820 it replaces, the 4-socket R830 delivers a significant performance boost using the latest Intel Xeon E5-4600 v4 processors with high core counts and faster DDR4 ...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

IT pro Rick Vanover revamped his Visio stencil for creating device and server diagrams. Among the additions to this version are: HP ProLiant DL series serversHP ProLiant BL blade enclosuresHP StorageW...

Keeping your organization on its feet during a crisis hinges on your ability to implement the disaster recovery strategies you have in place. This may include mobilizing your emergency management team...

From implementing comprehensive business continuity strategies to securing your recovery site, managing a viable DR program is a tremendous challenge. Learn about key measures such as planning and tes...

The Windows Server 2003 Volume Shadow Copy Service offers even small IT shops a unique opportunity to back up just like the big guys. Our Windows Server 2003 disaster prevention and recovery guide wal...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

IT pro Rick Vanover revamped his Visio stencil for creating device and server diagrams. Among the additions to this version are: HP ProLiant DL series serversHP ProLiant BL blade enclosuresHP StorageW...

Keeping your organization on its feet during a crisis hinges on your ability to implement the disaster recovery strategies you have in place. This may include mobilizing your emergency management team...